Monday, February 17, 2020

The End of Reading's Analysis Essay Example | Topics and Well Written Essays - 1250 words

The End of Reading's Analysis - Essay Example Trend states that, his daughter (Emily) is normal in every aspect but she is not good in reading and all this can be attributed to television programs and video games. She may catch up with her peers in terms of reading though it may take her quite a while as it is stated in the book. Trend has worked in various places that have given him exposure to research material on analysis of reading and visual studies. He worked for Journal of Media Arts and Cultural Criticism from 1980 to 1995, which deals in publishing of essays and articles through film studies, photographs and media theory. From the book it is apparent that there is a new type of illiteracy in America and people have resorted to blaming schools, the media too hasn’t been left behind in this blame game. From the book, End of Reading: Gutenberg to Grand Theft Auto, I am going to focus on the writer’s idea on The New American literacy, Blaming Schools, The media made me do it and Child development & human evolu tion so as to clearly show the importance of reading and how it has been affected over the passage of time. Analysis Right from the start the writer states about his daughter’s reluctance and inability to read well and that many other children are affected by the same problem, it is evident that there is some form of illiteracy. Furthermore statistics in the book state that one out of seven adults in America is incapable of reading a newspaper. It is clear that there is a new American illiteracy, where people do not know much as far as reading is concerned but prefer other mediums of learning. The Verbal SAT scores of the children in American schools have continued to dwindle over the decades that have passed. A researcher, Shieda White, states that most people have a difficulty in reading connected sentences or paragraphs. Many children would rather play video games and watch television than read a book. Reading has become torturous to many children in America since many att ribute it with difficulty. The amount of illiteracy is increasing in America, this problem is far from over since most of the people and organizations that can actually change it have resorted to blaming one another. Schools have turned into the main targets of those in search for someone to blame about the persisting problem. These learning institutions have been tirelessly trying to educate the children and make them more connected to the reading culture but the advancement in technology has failed them. Children no longer find books interesting as they would rather use computers, play video games and watch television. In the 90s some writer wrote books on the effects of computers, this when they were starting to crop up and whilst their popularity steadily increased, Marshall McLuhan and Raymond Williams are among the few who addressed the issue of technology in schools. Virtual community (1993) and Manual Castells’ The Information City (1989) are books that were written r ight after computers were introduced for personal use, they address how the computers were going to have effects on the society. If at all schools want to make learning effective then it is important that they use visual arts and introduce film studies. Some individual may not have what it takes to be good writers so they have to seek other means of expression. Leonardo Di Vinci is one person that can

Monday, February 3, 2020

Advantages and disadvantages of measures use to protect operating Research Paper

Advantages and disadvantages of measures use to protect operating system - Research Paper Example Operating system being a program is frequently attacked by viruses and therefore need protection so as to effectively and efficiently operate. There are several measures that are used to protect the operating system. However, the measures have certain disadvantages and disadvantages. This leads to differential in efficiency of measures used to protect the operating system. This paper discusses different measures used to protect the operating system and the advantages and disadvantages of each. It basically concentrates on three measures. Furthermore, it discusses ease of implementation and associated security management issues that need to be addressed. It also ranks the measures used to protect the operating system from the most effective to the least effective. Measures used to protect the operating system There are several measures that are used to protect the operating system. These are meant to deny unauthorized access to the system. They include use of strong password, protection of confidential information, making sure that the operating system and the virus protection are updated. It may also be use of supported and secure applications, wary of suspicious e-mails, storing of confidential information in HSU servers only, data should be provided wit a back up and it should be easily restored. Protection of information in all forms, learning security awareness and inquiring on matters that are not clear or certain. Measures used in protecting the operating system are aimed at protecting information from theft, natural disaster or corruption. It also ensures that information is only accessed by the authorized users. It also protects the operating system from collapse that may be caused by unauthorized persons. There are several measures that are used in protection of operating system as discussed above. However, the paper will focus on three measures only. They are use of a strong password, updating the operating system and the virus protection and data back up and ensuring they can be easily restored (Tatnall, Osorio, and Visscher, 2005, p 67). Use of strong password Operating systems are in most cases protected through passwords by most users. This is because this is one of the cheapest and easiest ways of protecting the operating system. Password may be in form of letters or numbers that are specifically known and recognized by the individual user. Furthermore, a password has to be unique to the user and unknown to unauthorized users. This ensures that unauthorized persons do not access data that they are not allowed to access by the respective persons. Password is widely used to protect the operating system by most users. However, it has both disadvantages and advantages (Meghanathan, 2011, p 79). Advantages of use of strong password (1) Guessing possibilit y; generally guessing a password is one of the most difficult things. This is because passwords are not usually displayed when entered. Passwords may be made long or short depending on the ability of the user to remember the password. This makes password difficult to guess and access the information without knowledge of the authorized user (Kim, and Adeli, 2010, pp 56-96). (2) Simple; passwords are simple and easy to generate. This is because anything may be used as password provided it falls within the accepted number of letters accepted by the system or that can be easily remembered by the user. Password may be words or letters or both. Furthermore, password may be in either upper case or lower case depending on the preference of the user (Kim, and Ad